In the study presented here, the author attempts to answer questions about the acquisition of information by prison staff that may have a bearing on their safety related to their service and work, the safety of isolated persons, and the general public. Internal regulations of the Prison Service (PS) related to the process of obtaining, processing, collecting and using information are indicated and discussed. Based on the research, the knowledge and action of PS officers in this area was analysed. The article aims to show information as an important factor directly affecting the security of penitentiary units.
The authors have conducted a retrospective analysis of the historical and logical stages of establishing the financial reporting system in the Russian Federation for determining the development direction of public reporting of economic entities and justifying the need to prepare integrated corporate reporting that meets the information needs of interested parties. The use of a paradigm approach made it possible to justify the regularities of the formative stages of accounting environment, to distinguish the key foundations of complex accounting information, to determine the current needs of business informatization and preparation of integrated corporate reporting.
Information today is becoming increasingly important, especially in the era of progressive computerization and advancements in the area of computer technology. At the same time, there are also increasingly more threats to this category, of which the most important are criminal offenses against information protection. These are enforced by competent state authorities whose activity is necessary to maintain the proper level of security. The article deals mainly with the phenomenon of crime involving infringement of information, and its scale, using for this purpose the statistical data collected by the Polish National Police Headquarters.
The internet space is the most important and affluent source of climate change related information. Hoverer information content are not always satisfying and threat of fake news and disinformation are very realistic. The analysis included top10 search results of four phrases (Climate change, Global warming, Adaptation to climate change and Climate change policy) using Google search engine. The phrases were searched in 11 Baltic Sea Region (BSR) languages and in the Ukrainian and English languages. The results revealed that climate change disinformation and misinterpretation exists on the internet. Mostly it displayed in indirect forms such as old information, existence of junksites, advertisements, unequal share by main actors (government, mass media, etc.). Moreover, on Eastern BSR languages, internet search results of climate change information are less convenient comparing to western BSR languages. The usage of multilanguage approach in Wikipedia pages could be one of the freshest and most reliable sources of information about climate change.
Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.